Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

"Chain"ging the Game - how runtime makes your supply chain even more secure

There is a lot of information out there (and growing) on software supply chain security. This info covers the basics around source and build, but does it cover all of your full software supply chain lifecycle? Is your build env at runtime protected? Is your application post deploy protected at runtime? This article will not only discuss what these concepts are, but provide additional discussions around the following: Read on brave reader…

Using Zero Trust to Mitigate Supply Chain Risks

Software supply chain attacks have been on the rise lately. With the current pervasiveness of third-party and open source libraries, which presumably developers cannot control as strongly as the code they create, vulnerabilities in these software dependencies are causing serious security risks to applications. Supply chain attacks abuse the inherent trust that users have with a software provider.

Arctic Wolf Acquires Habitu8 to Advance Security Awareness Training

Arctic Wolf’s acquisition of Habitu8 is a bold step forward in advancing security awareness training programs as attacks like phishing and credential theft continue to thrive. With 85% of attacks against organizations starting with human error, it’s perhaps not surprising that we continue to see low-quality, antiquated, and severely dated content recycled through organizations.

Supply Chain Security, Compliance, and Privacy For Cloud-Native Ecosystems

Think of the software supply chain as every software element in your organization—from software development of internal systems to open source or third-party enterprise software to vendors, partners, and even past suppliers who still hold access to company data or IT systems. Attacks on this software supply chain can damage individual departments, organizations, or entire industries by targeting and attacking insecure elements of your software fabric.

Netskope Selected to Participate in ATARC Zero Trust Lab

We are pleased to share that Netskope has been selected by the Advanced Technology Academic Research Center (ATARC) as one of 49 vendors to participate in its Zero Trust Lab. The Zero Trust Lab is a state-of-the-art physical and virtual test environment that will provide federal agencies with the opportunity to build, test, and evaluate new Zero Trust Architectures in a simulated environment.

Secret backdoor allegedly lets the REvil ransomware gang scam its own affiliates

REvil is one of the most notorious ransomware groups in the world. Also known as Sodin and Sodinokibi, REvil has made a name for itself extorting large amounts of money from businesses, operating as a ransomware-as-a-service (RAAS) business model that sees it share its profits with affiliates who break into networks and negotiate with victims on the group’s behalf.

How organizations handled incidents before and after deploying AIOps - Part 2

In this highly dynamic environment, organizations are looking for ways to innovate and manage resources efficiently. In the first part of the two-part blog series, we saw how organizations handled incidents without an AIOps solution and how long it took to resolve that incident — a scenario representing different steps to resolve an incident. In the second part of the two-part blog series, we look at how organizations were able to handle incidents after deploying AIOps.

Introducing Egnyte's Monthly Release Rollups

We’re kicking off a new series that will roll up our most recent product releases you need to know, all in one place. This first post will summarize some of the releases from the last few months. Moving forward, expect to see a post each month. We’re excited to share all the new features and product improvements we’ve been working on with you, so you can make the most of the Egnyte platform.

Fostering DevSecOps: Tool orchestration enables AppSec to keep pace with DevOps

Learn how tool orchestration empowers AppSec to keep pace with DevOps, providing a union of security and speed. Many organizations have advanced from the DevOps methodology to DevSecOps, and it is expected this trend will continue throughout 2020 as more enterprises leverage the cloud. A DevSecOps approach promotes collaboration between software application development teams and application security teams.